{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:44:02Z","timestamp":1761709442135,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811081224"},{"type":"electronic","value":"9789811081231"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-8123-1_28","type":"book-chapter","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T09:11:46Z","timestamp":1519377106000},"page":"319-332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Trust Model Based Uncertainty Analysis Between Multi-path Routes in MANET Using Subjective Logic"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7234-8108","authenticated-orcid":false,"given":"Sohail","family":"Muhammad","sequence":"first","affiliation":[]},{"given":"Liangmin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bushra","family":"Yamin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,24]]},"reference":[{"key":"28_CR1","unstructured":"Cook, K.S., (eds.): Trust in Society, vol. 2, Russell Sage Foundation Series on Trust, New York, Feb 2003"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the IEEE Symposium on Security and Privacy, 6\u20138 May, 1996, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"28_CR3","unstructured":"Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of the 27th Australasian Computer Science Conference (ACSC), vol. 26, Australian Computer Society, pp. 47\u201354 (2004)"},{"issue":"3","key":"28_CR4","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1002\/wcm.396","volume":"6","author":"R Li","year":"2006","unstructured":"Li, R., Li, J., Liu, P., Chen, H.H.: On demand public key management for mobile ad hoc networks. Wiley\u2019s Wirel. Commun. Mob. Comput. 6(3), 295\u2013306 (2006)","journal-title":"Wiley\u2019s Wirel. Commun. Mob. Comput."},{"issue":"4","key":"28_CR5","doi-asserted-by":"crossref","first-page":"1846","DOI":"10.1109\/TVT.2008.2005415","volume":"58","author":"BJ Chang","year":"2009","unstructured":"Chang, B.J., Kuo, S.L.: Markov chain trust model for trust value analysis and key management in distributed multicast MANETs. IEEE Trans. Veh. Technol. 58(4), 1846\u20131863 (2009)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"28_CR6","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/COMST.2006.253271","volume":"8","author":"A Hegland","year":"2006","unstructured":"Hegland, A., Winjum, E., Mjolsnes, S.F., Rong, C., Kure, O., Spilling, P.: A survey of key management in ad hoc networks. IEEE Commun. Surv. Tutor. 8(3), 48\u201366 (2006)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Jiang, T., Baras, J.S.: Ant-based adaptive trust evidence distribution in MANET. In: Proceedings of the 2nd International Conferecne on Mobile Distributed Computing Systems Workshops, Tokyo, Japan, 23\u201324 March 2004, pp. 588\u2013593 (2004)","DOI":"10.1109\/ICDCSW.2004.1284092"},{"issue":"3","key":"28_CR8","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A Josang","year":"2001","unstructured":"Josang, A.: A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 9(3), 279\u2013311 (2001)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Balakrishnan, V., Varadharajan, V., Tupakula, U.: Subjective logic based trust model for mobile ad hoc networks. In: Proceedings of the 4th international conference on Security and privacy in communication networks. SecureComm 2008. ACM, New York, NY, USA (2008)","DOI":"10.1145\/1460877.1460916"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Li, X., Lyu, M.R., Liu, J.: A trust model based routing protocol for secure ad hoc networks. In: 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No. 04TH8720), Vol. 2, pp. 1286\u20131295 (2004)","DOI":"10.1109\/AERO.2004.1367726"},{"issue":"9","key":"28_CR11","doi-asserted-by":"crossref","first-page":"4647","DOI":"10.1109\/TVT.2014.2313865","volume":"63","author":"Z Wei","year":"2014","unstructured":"Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, P.: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9), 4647\u20134658 (2014)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"28_CR12","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.adhoc.2015.03.004","volume":"30","author":"S Tan","year":"2015","unstructured":"Tan, S., Li, X., Dong, Q.: Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw. 30, 84\u201398 (2015). ISSN 1570-8705","journal-title":"Ad Hoc Netw."},{"issue":"6","key":"28_CR13","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1109\/TMC.2006.83","volume":"5","author":"A Pirzada","year":"2006","unstructured":"Pirzada, A., McDonald, C., Datta, A.: Performance comparison of trust-based reactive routing protocols. IEEE Trans. Mob. Comput. 5(6), 695\u2013710 (2006)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"9","key":"28_CR14","doi-asserted-by":"crossref","first-page":"1078","DOI":"10.1016\/j.comcom.2012.09.002","volume":"36","author":"H Xia","year":"2013","unstructured":"Xia, H., Jia, Z., Ju, L., Li, X., Sha, E.H.-M.: Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Comput. Commun. 36(9), 1078\u20131093 (2013). ISSN 0140-3664","journal-title":"Comput. Commun."},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: The 3rd ACM workshop on Wireless security, WiSe 2004, pp. 1\u201310 (2004)","DOI":"10.1145\/1023646.1023648"},{"key":"28_CR16","unstructured":"J\u00f8sang, A.: An algebra for assessing trust in certification chains. In: The Network and Distributed Systems Security Symposium, NDSS 99 (1999)"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust cooperative trust establishment for MANETs. In: The fourth ACM workshop on security of ad hoc and sensor networks, pp. 23\u201334 (2006)","DOI":"10.1145\/1180345.1180349"},{"issue":"10","key":"28_CR18","doi-asserted-by":"crossref","first-page":"1654","DOI":"10.1360\/crad20051002","volume":"42","author":"T Wen","year":"2005","unstructured":"Wen, T., Jianbin, H., Zhong, C.: Research on a fuzzy logic-based subjective trust management model. J. Comput. Res. Dev. 42(10), 1654\u20131659 (2005)","journal-title":"J. Comput. Res. Dev."},{"issue":"4","key":"28_CR19","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1049\/iet-ifs.2009.0140","volume":"4","author":"X Li","year":"2010","unstructured":"Li, X., Jia, Z., Zhang, P., Zhang, R., Wang, H.: Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf. Secur. 4(4), 212\u2013232 (2010)","journal-title":"IET Inf. Secur."},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, C., Zhu, X., Song, Y., Fang, Y.: A formal study of trust-based routing in wireless ad hoc networks. In: 2010 Proceedings of the IEEE INFOCOM, pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5462116"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Marina, M.K., Dass, R.: On-demand multipath distance vector routing for ad hoc networks. In: Proceedings of International Conference on Network Protocols, Riverside, CA, USA, pp. 11\u201314, Nov 2001","DOI":"10.1109\/ICNP.2001.992756"},{"key":"28_CR22","unstructured":"Hang, C-W., Wang, Y., Singh, M.P.: Operators for propagating trust and their evaluation in social networks. In: 8th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2009, 10-15 May, 2009 Budapest, Hungary (2009)"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Liu, G., Yang, Q., Wang, H., Lin, X., Wittie, M.P.: Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Toronto, ON, pp. 1698\u20131706 (2014)","DOI":"10.1109\/INFOCOM.2014.6848107"},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Liu, G., Chen, Q., Yang, Q., Wang, H., Zhu, B., Wang, W.: Opinionwalk: An efficient solution to massive trust assessment in online social networks. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications (2017)","DOI":"10.1109\/INFOCOM.2017.8057106"}],"container-title":["Communications in Computer and Information Science","Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-8123-1_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:10:25Z","timestamp":1751415025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-8123-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811081224","9789811081231"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-8123-1_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}